Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Arctic Wolf Labs’ 2025 cybersecurity predictions

Discover five core trends from this latest report, including the new vulnerabilities to ransomware, technical innovations exploited by attackers, and improved social engineering techniques. Learn why you need to be on high-alert when global disasters strikes, and stay ahead with these expert insights.

Proactive cyber resilience: Stopping threats before they ignite

Explore why breaches happen and how to respond faster with advanced disruption techniques and automation. We’ll provide actionable insights on detection, disruption and containment, minimising damage, and continuous improvement. Make your organisation too costly a target for attackers to bother with.

Neutralising vulnerabilities in AI-generated code

GenAI can save developers time, but it can also leave us exposed to attacks. Watch now to equip your developer and security teams with the knowledge and skills to limit the risks of insecure AI-generated code, and discover a data-driven approach to building cyber capabilities – essential for preventing serious breaches.

Cyber simulation workshop: Choose your own adventure

Join us for a hands-on exercise based on real-world adversaries causing large-scale disruption today. You'll make key decisions that will shape the outcome of an attack and recovery efforts. Learn about major threat actors, stress-test your problem-solving skills, and take away actionable insights.

AI vs Human hackers: The evolution of cyber attacks

Massive data breaches are supplying AI with vast amounts of personal information, enabling it to craft highly personalised attacks. Messages and deepfakes will soon be almost undetectable. Watch now as we explored the importance of education on the dangers of AI-driven cyber threats, and reducing reliance on email.

From access to attack: Protect identity systems from threats and incidents

Join us to understand the who, what, and when in your hybrid identity systems. Explore why it’s crucial to defend against malicious intent, not just prevent misconfigurations. We’ll also examine the importance of monitoring changes to identify who is making them, and whether we can protect against them.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue